{"id":12961,"date":"2021-04-16T15:21:49","date_gmt":"2021-04-16T20:21:49","guid":{"rendered":"http:\/\/45.33.92.219\/?p=12961"},"modified":"2021-04-16T15:21:49","modified_gmt":"2021-04-16T20:21:49","slug":"cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government","status":"publish","type":"post","link":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/","title":{"rendered":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government"},"content":{"rendered":"<h1><strong>Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government<\/strong><\/h1>\n<p><strong>By: Bruce G. Kreeger<\/strong><\/p>\n<div style=\"text-align: justify;\">\n<h6><strong><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-12963\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg\" alt=\"\" width=\"1019\" height=\"728\" \/><\/a>Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy<\/strong>.<\/h6>\n<p>&#8220;I have nothing to hide&#8221; was once the standard response to surveillance programs utilizing cameras, border checks, and casual questioning by law enforcement.<\/p>\n<p>Privacy used to be considered a concept generally respected in many countries with a few changes to rules and regulations here and often made only in the name of the common good.<\/p>\n<p>Things have changed, and not for the better.<\/p>\n<p>China&#8217;s\u00a0Great Firewall, the UK&#8217;s\u00a0Snooper&#8217;s Charter, the US&#8217;\u00a0mass surveillance\u00a0and bulk data collection, compliments of the National Security Agency (NSA), Russia&#8217;s\u00a0insidious election meddling, and countless censorship and communication blackout schemes\u00a0across the Middle East\u00a0are all contributing to a global surveillance state in which privacy is a luxury of the few and not a right of the many.<\/p>\n<p>&nbsp;<\/p>\n<p>As surveillance becomes a\u00a0common factor of our daily lives, privacy is in danger of no longer being considered an intrinsic right.<\/p>\n<p>&nbsp;<\/p>\n<p>Everything from our web browsing to mobile devices and the Internet of Things (IoT) products installed in our homes have the potential to erode our privacy and personal security, and you cannot depend on vendors or ever-changing surveillance rules to keep them intact.<\/p>\n<p>Having &#8220;nothing to hide&#8221; doesn&#8217;t cut it anymore. We must all do whatever we can to safeguard our privacy. Taking the steps outlined below can not only give you some sanctuary from spreading surveillance tactics but also help keep you safe from cyberattacks, scam artists, and a new, emerging issue: misinformation.<\/p>\n<h2><strong><u>DATA MANAGEMENT IS AT THE HEART OF PRIVACY<\/u><\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p>Data is a vague concept and can encompass such a wide range of information that it is worth briefly breaking down different collections before examining how each area is relevant to your privacy and security.<\/p>\n<h3><strong><u>PERSONALLY, IDENTIFIABLE INFORMATION (PII)<\/u><\/strong><\/h3>\n<p><strong><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/w.jpg\"><img decoding=\"async\" class=\"wp-image-12964 aligncenter\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/w.jpg\" alt=\"\" width=\"813\" height=\"455\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/best-antivirus\/\"><strong>The best antivirus software and apps<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>A roundup of the best software and apps for Windows and Mac computers, as well as iOS and Android devices, to keep yourself safe from malware and viruses.<\/p>\n<h1><u>What is personally identifiable information (PII)? How to protect it under GDPR<\/u><\/h1>\n<p>Known as PII , this can include your name, physical home address, email address, telephone numbers, date of birth, marital status, Social Security numbers (US). Also, National Insurance numbers (UK) and other information relating to your medical status, family members, employment, and education.<\/p>\n<p><strong>Why does it matter?<\/strong> Whether lost in\u00a0different data breaches\u00a0or stolen piecemeal through phishing campaigns, all this data can provide attackers with enough information to conduct identity theft, take out loans using your name. This can and does potentially compromise online accounts that rely on security questions being answered correctly. This information can also prove to be\u00a0a gold mine for advertisers\u00a0lacking a moral backbone in the wrong hands.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong><u>BROWSING HABITS AND WEBSITE VISITS<\/u><\/strong><\/h3>\n<p>Internet activity is monitored by an Internet Service Provider (ISP)\u00a0and can be hijacked. While there is little consumers can do about attacks at the ISP level, the web pages you visit can also be tracked by cookies, which are small bits of text downloaded and stored by your browser. Browser plugins may also track your activity across multiple websites.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Why does it matter? <\/strong>Cookies are used to personalize internet experiences, and this can include tailored advertising. However, such tracking\u00a0can go too far, as shown when the\u00a0unique identifiers\u00a0added to a cookie are used across different services and various marketing platforms. Such practices are often considered intrusive.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/topic\/cyberwar-and-the-future-of-cybersecurity\/\"><strong>Cyberwar and the Future of Cybersecurity<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Today&#8217;s security threats have expanded in scope and seriousness. There can now be millions &#8212; or even billions &#8212; of dollars at risk when information security isn&#8217;t handled correctly.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong><u>MESSAGE AND EMAIL CONTENT<\/u><\/strong><\/h3>\n<p>Our email accounts are often the pathway that can provide a link to all our other valuable accounts, as well as a record of our communication with friends, families, and colleagues. As central hubs to other online services, hackers may try to obtain our passwords through credential stuffing, social engineering, or phishing scams to jump to other services.<\/p>\n<p><strong>Why does it matter<\/strong><strong>?<\/strong>\u00a0If an email account acts as a singular hub for other services, a single compromise can snowball into the hijack of many accounts and services.<\/p>\n<p><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/e.jpg\"><img decoding=\"async\" class=\"alignnone  wp-image-12962\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/e.jpg\" alt=\"\" width=\"815\" height=\"502\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong><u>ONLINE PURCHASES, FINANCIAL INFORMATION<\/u><\/strong><\/h3>\n<p>When you conduct a transaction online, this information may include credentials for financial services such as PayPal or credit card information, including card numbers, expiry dates, and security codes.<\/p>\n<p>The average consumer cannot avoid new attacks known as\u00a0Magecart campaigns as they take place on vulnerable e-commerce websites, with code injected into payment portals to skim and steal card data input by customers. Past victims of Magecart groups include\u00a0Ticketmaster,\u00a0Boom! Mobile, and\u00a0British Airways.<\/p>\n<p><u>\u00a0<\/u><\/p>\n<p><strong>Why does it matter?<\/strong>\u00a0Cybercriminals who steal financial services credentials through phishing and fraudulent websites, who eavesdrop on your transactions through Man-in-The-Middle (MiTM) attacks, or who utilize card-skimming malware can steal these details when they are not secured.<\/p>\n<p>&nbsp;<\/p>\n<p>Once this information has been obtained, unauthorized transactions can be made, cloned cards may be created, or this data\u00a0may also be sold\u00a0on to others in the Dark Web.<\/p>\n<p>&nbsp;<\/p>\n<p>Look for our next article on the Dark Web.<\/p>\n<\/div>\n<div style=\"text-align: justify;\">\n<p><strong>Clarity is proud to have been providing Network Security\u202fServices, including Network Security Assessments and Firewall Systems, to the Americas\u202ffor many\u00a0years,\u00a0including clients\u202fWorldwide offering our unified communications platform. Clarity Technologies Group, LLC surpasses expectations.<\/strong><\/p>\n<p><strong><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/12\/clarity-logo.jpg\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/a><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/12\/clarity-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-12191\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/12\/clarity-logo.jpg\" alt=\"clarity-logo\" width=\"300\" height=\"116\" \/><\/a><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/12\/dot-log.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-12192\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/12\/dot-log.png\" alt=\"\" width=\"130\" height=\"142\" \/> <\/a><\/strong><\/p>\n<p><strong>Call Clarity at 800-354-4160 today or email us at\u202f<\/strong><a href=\"mailto:info@clarityscg.com\"><strong>info@clarityscg.com<\/strong><\/a><strong>\u202f. We are partnered\u00a0worldwide,\u00a0and we are open seven days a week\u00a0for support,\u00a08:30 AM to 5:00 PM EST\/EDT.\u202f<\/strong><a href=\"http:\/\/45.33.92.219\/\"><strong>http:\/\/45.33.92.219\/<\/strong><\/a><strong>and\u202f<\/strong><a href=\"https:\/\/dotmantech.com\/\"><strong>https:\/\/dotmantech.com<\/strong><\/a><strong>\u202f.<\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government By: Bruce G. Kreeger Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. &#8220;I have nothing to hide&#8221; was once the standard response to surveillance programs utilizing cameras, border checks, and casual [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-12961","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government By: Bruce G. Kreeger Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. &#8220;I have nothing to hide&#8221; was once the standard response to surveillance programs utilizing cameras, border checks, and casual [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-16T20:21:49+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg\" \/>\n<meta name=\"author\" content=\"Bruce Kreeger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Kreeger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/\"},\"author\":{\"name\":\"Bruce Kreeger\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"headline\":\"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government\",\"datePublished\":\"2021-04-16T20:21:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/\"},\"wordCount\":978,\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/q.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/\",\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/\",\"name\":\"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/q.jpg\",\"datePublished\":\"2021-04-16T20:21:49+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#primaryimage\",\"url\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/q.jpg\",\"contentUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/q.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/04\\\/16\\\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/claritytg.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\",\"url\":\"https:\\\/\\\/claritytg.com\\\/\",\"name\":\"\",\"description\":\"Your Solutions Provider\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/claritytg.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\",\"name\":\"Bruce Kreeger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"caption\":\"Bruce Kreeger\"},\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/author\\\/bruec-kreeger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -","og_description":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government By: Bruce G. Kreeger Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. &#8220;I have nothing to hide&#8221; was once the standard response to surveillance programs utilizing cameras, border checks, and casual [&hellip;]","og_url":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/","article_published_time":"2021-04-16T20:21:49+00:00","og_image":[{"url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg","type":"","width":"","height":""}],"author":"Bruce Kreeger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Kreeger","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#article","isPartOf":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/"},"author":{"name":"Bruce Kreeger","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"headline":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government","datePublished":"2021-04-16T20:21:49+00:00","mainEntityOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/"},"wordCount":978,"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/","url":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/","name":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government -","isPartOf":{"@id":"https:\/\/claritytg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#primaryimage"},"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg","datePublished":"2021-04-16T20:21:49+00:00","author":{"@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"breadcrumb":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#primaryimage","url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg","contentUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/04\/q.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/claritytg.com\/index.php\/2021\/04\/16\/cybersecurity-101-protect-your-privacy-from-hackers-spies-and-the-government\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/claritytg.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity 101: Protect Your Privacy From Hackers, Spies, And The Government"}]},{"@type":"WebSite","@id":"https:\/\/claritytg.com\/#website","url":"https:\/\/claritytg.com\/","name":"","description":"Your Solutions Provider","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/claritytg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a","name":"Bruce Kreeger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","caption":"Bruce Kreeger"},"url":"https:\/\/claritytg.com\/index.php\/author\/bruec-kreeger\/"}]}},"_links":{"self":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/12961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/comments?post=12961"}],"version-history":[{"count":0,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/12961\/revisions"}],"wp:attachment":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/media?parent=12961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/categories?post=12961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/tags?post=12961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}